SlideShare a Scribd company logo
1 of 2
Final Project - IoT Security Research
Attached Files:
Personal data breaches and securing IoT devices.docx
(55.866 KB)
What are the Challenges of IoT Security.docx
(17.965 KB)
IoT References.docx
(13.394 KB)
Final Research Project - IoT.docx
(51.345 KB)
Final Assignment - Project Plan (Deliverables):
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps
include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
1) Address each of the FOUR IoT security steps listed above in
terms of IoT devices by explaining in a step-by-step guide, how
to make people more aware of the problems associated with the
use of IoT devices.
2) If you owned a large company like RING, SimpliSafe,
MedicalAlert or NEST that experienced a data breach due to
faulty security settings on one of your IoT devices (such as a
video doorbell or medical alert bracelet or a similar device)
what would you tell your business partners and customers?
Prepare a letter to send to your customers explaining the
situation and what you plan to do about it. Keep in mind you
want to do all you can to avoid losing business over this breach.

More Related Content

Similar to Final Project - IoT Security ResearchAttached Files P

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityDeniseFerniza
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 

Similar to Final Project - IoT Security ResearchAttached Files P (20)

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 

More from depoerossie

Transmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxTransmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxdepoerossie
 
Translating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxTranslating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxdepoerossie
 
Treating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxTreating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxdepoerossie
 
Transparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxTransparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxdepoerossie
 
Translating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxTranslating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxdepoerossie
 
translate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxtranslate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxdepoerossie
 
Transportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxTransportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxdepoerossie
 
Transition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxTransition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxdepoerossie
 
Transform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxTransform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxdepoerossie
 
Traditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxTraditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxdepoerossie
 
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxTragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxdepoerossie
 
Trace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxTrace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxdepoerossie
 
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxTopic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxdepoerossie
 
Tourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxTourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxdepoerossie
 
Topic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxTopic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxdepoerossie
 
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxTopic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxdepoerossie
 
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxTopic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxdepoerossie
 
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxTopic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxdepoerossie
 
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxTopic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxdepoerossie
 
Topic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxTopic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxdepoerossie
 

More from depoerossie (20)

Transmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docxTransmission of Genetic MaterialComplete the discussions on the fo.docx
Transmission of Genetic MaterialComplete the discussions on the fo.docx
 
Translating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docxTranslating Theories and Research into PracticeIntroductio.docx
Translating Theories and Research into PracticeIntroductio.docx
 
Treating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docxTreating people fairly (e.g no discrimination, harassment, absence o.docx
Treating people fairly (e.g no discrimination, harassment, absence o.docx
 
Transparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docxTransparency in the WorkplaceIt is not a surprise that transpar.docx
Transparency in the WorkplaceIt is not a surprise that transpar.docx
 
Translating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docxTranslating Theory Into PracticeWhen water is in a solid state.docx
Translating Theory Into PracticeWhen water is in a solid state.docx
 
translate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docxtranslate the attached code in matlab to ansi C.It is required to .docx
translate the attached code in matlab to ansi C.It is required to .docx
 
Transportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docxTransportation has played a tremendous role in shaping the economy a.docx
Transportation has played a tremendous role in shaping the economy a.docx
 
Transition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docxTransition into AdulthoodThe transition into adulthood may dif.docx
Transition into AdulthoodThe transition into adulthood may dif.docx
 
Transform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docxTransform at least 4 Renaissance masters into a cast of superheroes .docx
Transform at least 4 Renaissance masters into a cast of superheroes .docx
 
Traditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docxTraditionally, mental illness was considered a biological problem, e.docx
Traditionally, mental illness was considered a biological problem, e.docx
 
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docxTragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
Tragedy Across the Mediterranean Consider The Tale of Sohrab” fr.docx
 
Trace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docxTrace the patterns of international migration since 1970, with refer.docx
Trace the patterns of international migration since 1970, with refer.docx
 
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docxTopic:Food Access and Health Outcomes in AmericanIntroduction.docx
Topic:Food Access and Health Outcomes in AmericanIntroduction.docx
 
Tourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docxTourism Development in Kuwait Reality and FutureThe gover.docx
Tourism Development in Kuwait Reality and FutureThe gover.docx
 
Topic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docxTopic Securing the crime scene and crime scene searchResear.docx
Topic Securing the crime scene and crime scene searchResear.docx
 
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docxTopic Worldview AnalysisQuestionPrompt After reviewing the .docx
Topic Worldview AnalysisQuestionPrompt After reviewing the .docx
 
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docxTopic Water and Real EstateWrite a 1 page reviewcommentary o.docx
Topic Water and Real EstateWrite a 1 page reviewcommentary o.docx
 
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docxTopic Influence of Foot Binding in Chinese Women During the 20th .docx
Topic Influence of Foot Binding in Chinese Women During the 20th .docx
 
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docxTopic Impact of Bring Your Device (BYOD) at workplace Analys.docx
Topic Impact of Bring Your Device (BYOD) at workplace Analys.docx
 
Topic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docxTopic Individuals currently have a rather interesting status with.docx
Topic Individuals currently have a rather interesting status with.docx
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfcupulin
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 

Final Project - IoT Security ResearchAttached Files P

  • 1. Final Project - IoT Security Research Attached Files: Personal data breaches and securing IoT devices.docx (55.866 KB) What are the Challenges of IoT Security.docx (17.965 KB) IoT References.docx (13.394 KB) Final Research Project - IoT.docx (51.345 KB) Final Assignment - Project Plan (Deliverables): Securing IoT Devices: What are the Challenges? Security practitioners suggest that key IoT security steps include: 1) Make people aware that there is a threat to security; 2) Design a technical solution to reduce security vulnerabilities; 3) Align the legal and regulatory frameworks; and 4) Develop a workforce with the skills to handle IoT security.
  • 2. Final Assignment - Project Plan (Deliverables): 1) Address each of the FOUR IoT security steps listed above in terms of IoT devices by explaining in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. 2) If you owned a large company like RING, SimpliSafe, MedicalAlert or NEST that experienced a data breach due to faulty security settings on one of your IoT devices (such as a video doorbell or medical alert bracelet or a similar device) what would you tell your business partners and customers? Prepare a letter to send to your customers explaining the situation and what you plan to do about it. Keep in mind you want to do all you can to avoid losing business over this breach.